liu.seSearch for publications in DiVA
Endre søk
Begrens søket
1234567 51 - 100 of 29470
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Treff pr side
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
Merk
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 51.
    Abdulla, Parosh Aziz
    et al.
    Uppsala University, Sweden.
    Atig, Mohamed Faouzi
    Uppsala University, Sweden.
    Chen, Yu-Fang
    Academia Sinica, Taiwan.
    Leonardsson, Carl
    Uppsala University, Sweden.
    Rezine, Ahmed
    Linköpings universitet, Institutionen för datavetenskap, Programvara och system. Linköpings universitet, Tekniska högskolan.
    Memorax, a Precise and Sound Tool for Automatic Fence Insertion under TSO2013Inngår i: Tools and Algorithms for the Construction and Analysis of Systems: 19th International Conference, TACAS 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings, Springer Berlin/Heidelberg, 2013, s. 530-536Konferansepaper (Fagfellevurdert)
    Abstract [en]

    We introduce MEMORAX, a tool for the verification of control state reachability (i.e., safety properties) of concurrent programs manipulating finite range and integer variables and running on top of weak memory models. The verification task is non-trivial as it involves exploring state spaces of arbitrary or even infinite sizes. Even for programs that only manipulate finite range variables, the sizes of the store buffers could grow unboundedly, and hence the state spaces that need to be explored could be of infinite size. In addition, MEMORAX in- corporates an interpolation based CEGAR loop to make possible the verification of control state reachability for concurrent programs involving integer variables. The reachability procedure is used to automatically compute possible memory fence placements that guarantee the unreachability of bad control states under TSO. In fact, for programs only involving finite range variables and running on TSO, the fence insertion functionality is complete, i.e., it will find all minimal sets of memory fence placements (minimal in the sense that removing any fence would result in the reachability of the bad control states). This makes MEMORAX the first freely available, open source, push-button verification and fence insertion tool for programs running under TSO with integer variables.

  • 52.
    Abdulla, Parosh Aziz
    et al.
    Uppsala University.
    Atig, Mohammed Faouzi
    Uppsala University.
    Ganjei, Zeinab
    Linköpings universitet, Institutionen för datavetenskap, Programvara och system. Linköpings universitet, Tekniska fakulteten.
    Rezine, Ahmed
    Linköpings universitet, Institutionen för datavetenskap, Programvara och system. Linköpings universitet, Tekniska högskolan.
    Zhu, Yunyun
    Uppsala University.
    Verification of Cache Coherence Protocols wrt. Trace Filters2015Konferansepaper (Fagfellevurdert)
    Abstract [en]

    We address the problem of parameterized verification of cache coherence protocols for hardware accelerated transactional memories. In this setting, transactional memories leverage on the versioning capabilities of the underlying cache coherence protocol. The length of the transactions, their number, and the number of manipulated variables (i.e., cache lines) are parameters of the verification problem. Caches in such systems are finite-state automata communicating via broadcasts and shared variables. We augment our system with filters that restrict the set of possible executable traces according to existing conflict resolution policies. We show that the verification of coherence for parameterized cache protocols with filters can be reduced to systems with only a finite number of cache lines. For verification, we show how to account for the effect of the adopted filters in a symbolic backward reachability algorithm based on the framework of constrained monotonic abstraction. We have implemented our method and used it to verify transactional memory coherence protocols with respect to different conflict resolution policies.

  • 53.
    Abdulla, Parosh Aziz
    et al.
    Uppsala University, Sweden.
    Dwarkadas, Sandhya
    University of Rochester, U.S.A..
    Rezine, Ahmed
    Linköpings universitet, Institutionen för datavetenskap, Programvara och system. Linköpings universitet, Tekniska högskolan.
    Shriraman, Arrvindh
    Simon Fraser University, Canada.
    Zhu, Yunyun
    Uppsala University, Sweden.
    Verifying Safety and Liveness for the FlexTM Hybrid Transactional Memory2013Inngår i: Design, Automation & Test in Europe (DATE 2013), Grenoble, France, March 18-22, 2013., IEEE , 2013, s. 785-790Konferansepaper (Fagfellevurdert)
    Abstract [en]

    We consider the verification of safety (strict se- rializability and abort consistency) and liveness (obstruction and livelock freedom) for the hybrid transactional memory framework FLEXTM. This framework allows for flexible imple- mentations of transactional memories based on an adaptation of the MESI coherence protocol. FLEXTM allows for both eager and lazy conflict resolution strategies. Like in the case of Software Transactional Memories, the verification problem is not trivial as the number of concurrent transactions, their size, and the number of accessed shared variables cannot be a priori bounded. This complexity is exacerbated by aspects that are specific to hardware and hybrid transactional memories. Our work takes into account intricate behaviours such as cache line based conflict detection, false sharing, invisible reads or non-transactional instructions. We carry out the first automatic verification of a hybrid transactional memory and establish, by adopting a small model approach, challenging properties such as strict serializability, abort consistency, and obstruction freedom for both an eager and a lazy conflict resolution strategies. We also detect an example that refutes livelock freedom. To achieve this, our prototype tool makes use the latest antichain based techniques to handle systems with tens of thousands of states.

  • 54.
    Abdulla, Parosh Aziz
    et al.
    Uppsala University, Sweden.
    Haziza, Frédéric
    Uppsala University, Sweden.
    Holik, Lukas
    Brno University of Technology, Czech Republic.
    Jonsson, Bengt
    Uppsala University, Sweden.
    Rezine, Ahmed
    Linköpings universitet, Institutionen för datavetenskap, Programvara och system. Linköpings universitet, Tekniska högskolan.
    An Integrated Specification and Verification Technique for Highly Concurrent Data Structures2013Inngår i: The 19th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2013), Rome, Italy, March 16-24, 2013. / [ed] Piterman, Nir, Smolka, Scott, 2013Konferansepaper (Fagfellevurdert)
    Abstract [en]

    We present a technique for automatically verifying safety properties of concurrent programs, in particular programs which rely on subtle dependencies of local states of different threads, such as lock-free implementations of stacks and queues in an environment without garbage collection. Our technique addresses the joint challenges of infinite-state specifications, an unbounded number of threads, and an unbounded heap managed by explicit memory allocation. Our technique builds on the automata-theoretic approach to model checking, in which a specification is given by an automaton that observes the execution of a program and accepts executions that violate the intended specification.We extend this approach by allowing specifications to be given by a class of infinite-state automata. We show how such automata can be used to specify queues, stacks, and other data structures, by extending a data-independence argument. For verification, we develop a shape analysis, which tracks correlations between pairs of threads, and a novel abstraction to make the analysis practical. We have implemented our method and used it to verify programs, some of which have not been verified by any other automatic method before.

  • 55.
    Abdullah, M Ailieen
    et al.
    Royal Institute of Technology.
    Öhrwall Rönnbäck, Anna
    Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, Industriell marknadsföring och industriell ekonomi. Linköpings universitet, Tekniska högskolan.
    Ölundh Sandström, Gunilla
    Royal Institute of Technology.
    Building Networks for Delivering Integrated Product-Service Offerings (IPSOs)2010Inngår i: Proceedings of 2nd CIRP IPS2 Conference 2010 - Industrial product-service systems -IPS², CIRP , 2010Konferansepaper (Fagfellevurdert)
    Abstract [en]

    The paper describes the effect of forming business networks and collaborations for the purpose of developing an Integrated Product-Service Offering (IPSO) using the Product/Service Systems (PSS). The research method is an in-depth case study of a joint venture formed by four companies developing a new technology for chemical extraction from water sludge waste within the pulp and paper industry.

    Combining literature from PSS, network theories and collaborative product development, this paper puts forward the benefits for SMEs to collaborate in business networks and produce IPSOs when introducing a new technology in an emerging market. The case study shows that working towards the new market would not have been possible if each party acted individually or maintained their traditional buyer-supplieroperator roles, and that IPSOs can reduce the business risk.

    Fulltekst (pdf)
    fulltext
  • 56.
    Abelow, Alexis
    et al.
    University of Utah, Salt Lake City, USA.
    Persson, Kristin
    Linköpings universitet, Institutionen för teknik och naturvetenskap. Linköpings universitet, Tekniska högskolan.
    Jager, Edwin
    Linköpings universitet, Institutionen för fysik, kemi och biologi, Biosensorer och bioelektronik. Linköpings universitet, Tekniska högskolan.
    Berggren, Magnus
    Linköpings universitet, Institutionen för teknik och naturvetenskap. Linköpings universitet, Tekniska högskolan.
    Zharov, Ilya
    University of Utah, Salt Lake City, USA.
    Electroresponsive Nanoporous Membranes by Coating Anodized Alumina with Poly(3,4-ethylenedioxythiophone) and Polypyrrole2014Inngår i: Macromolecular materials and engineering, ISSN 1438-7492, E-ISSN 1439-2054, Vol. 299, nr 2, s. 190-197Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Electrically-active nanoporous membranes are prepared by coating the surface of anodized alumina with electroactive polymers using vapor phase polymerization with four combinations of conjugated polymers and doping ions: poly(3,4-ethylenedioxythiophone) and polypyrrole, FeCl3 and FeTs3. The permeability of the polymer-coated membranes is measured as a function of the applied electric potential. A reversible three-fold increase is found in molecular flux of a neutral dye for membranes in oxidized state compared to that in the reduced state. After analyzing various factors that may affect the molecular transport through these membranes, it is concluded that the observed behavior results mostly from swelling/deswelling of the polymers and from the confinement of the polymers inside the nanopores.

  • 57.
    Aberg, D
    et al.
    Royal Inst Technol, SE-16440 Kista, Sweden Linkoping Univ, Dept Phys & Measurement Technol, SE-58183 Linkoping, Sweden.
    Storasta, Liutauras
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för fysik, kemi och biologi, Halvledarmaterial.
    Hallen, A
    Royal Inst Technol, SE-16440 Kista, Sweden Linkoping Univ, Dept Phys & Measurement Technol, SE-58183 Linkoping, Sweden.
    Svensson, BG
    Implantation temperature dependent deep level defects in 4H-SiC2001Inngår i: Materials Science Forum, Vols. 353-356, 2001, Vol. 353-3, s. 443-446Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Deep level transient spectroscopy spectra of the near Z-defect region (150-350K) were investigated for B implanted samples of low doses (10(8)-10(9) cm(-2)). For 300 degreesC implantation, a level at an energy of 0.41 eV below the conduction hand edge was found, referred to as the S-level. The S-center was shown to form in both implanted and electron irradiated 4H-SiC, either after room temperature (R.T.) implantation followed by mild heat treatments or lung R.T. storage (several months) or after 200-300 degreesC implantations/irradiations. The S-center was found to anneal out at temperatures above 250 degreesC.

  • 58.
    Aberger, Martin
    Linköpings universitet, Institutionen för systemteknik, Reglerteknik. Linköpings universitet, Tekniska högskolan.
    Effects of Nonlinearities in Black Box Identification of an Industrial Robot2000Rapport (Annet vitenskapelig)
    Abstract [en]

    This paper discusses effects of nonlinearities in black box identification of one axis of a robot. The used data come from a commercial ABB robot, IRB1400. A three-mass flexible model for the robot was built in MathModelica. The nonlinearities in the model are nonlinear friction and backlash in the gear box.

    Fulltekst (pdf)
    FULLTEXT01
  • 59. Bestill onlineKjøp publikasjonen >>
    Abidin, Aysajan
    Linköpings universitet, Institutionen för systemteknik, Informationskodning. Linköpings universitet, Tekniska högskolan.
    Authentication in Quantum Key Distribution: Security Proof and Universal Hash Functions2013Doktoravhandling, med artikler (Annet vitenskapelig)
    Abstract [en]

    Quantum Key Distribution (QKD) is a secret key agreement technique that consists of two parts: quantum transmission and measurement on a quantum channel, and classical post-processing on a public communication channel. It enjoys provable unconditional security provided that the public communication channel is immutable. Otherwise, QKD is vulnerable to a man-in-the-middle attack. Immutable public communication channels, however, do not exist in practice. So we need to use authentication that implements the properties of an immutable channel as well as possible. One scheme that serves this purpose well is the Wegman-Carter authentication (WCA), which is built upon Almost Strongly Universal2 (ASU2) hashing. This scheme uses a new key in each authentication attempt to select a hash function from an ASU2 family, which is then used to generate the authentication tag for a message.

    The main focus of this dissertation is on authentication in the context of QKD. We study ASU2 hash functions, security of QKD that employs a computationally secure authentication, and also security of authentication with a partially known key. Specifically, we study the following.

    First, Universal hash functions and their constructions are reviewed, and as well as a new construction of ASU2 hash functions is presented. Second, security of QKD that employs a specific computationally secure authentication is studied. We present detailed attacks on various practical implementations of QKD that employs this authentication. We also provide countermeasures and prove necessary and sufficient conditions for upgrading the security of the authentication to the level of unconditional security. Third, Universal hash function based multiple authentication is studied. This uses a fixed ASU2 hash function followed by one-time pad encryption, to keep the hash function secret. We show that the one-time pad is necessary in every round for the authentication to be unconditionally secure. Lastly, we study security of the WCA scheme, in the case of a partially known authentication key. Here we prove tight information-theoretic security bounds and also analyse security using witness indistinguishability as used in the Universal Composability framework.

    Delarbeid
    1. New Universal Hash Functions
    Åpne denne publikasjonen i ny fane eller vindu >>New Universal Hash Functions
    2012 (engelsk)Inngår i: Lecture Notes in Computer Science, Vol. 7242 / [ed] Frederik Armknecht and Stefan Lucks, Springer Berlin Heidelberg , 2012, s. 99-108Konferansepaper, Publicerat paper (Fagfellevurdert)
    Abstract [en]

    Universal hash functions are important building blocks for unconditionally secure message authentication codes. In this paper, we present a new construction of a class of Almost Strongly Universal hash functions with much smaller description (or key) length than the Wegman-Carter construction. Unlike some other constructions, our new construction has a very short key length and a security parameter that is independent of the message length, which makes it suitable for authentication in practical applications such as Quantum Cryptography.

    sted, utgiver, år, opplag, sider
    Springer Berlin Heidelberg, 2012
    Serie
    Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349 ; 7242
    HSV kategori
    Identifikatorer
    urn:nbn:se:liu:diva-84711 (URN)10.1007/978-3-642-34159-5_7 (DOI)978-3-642-34158-8 (ISBN)978-3-642-34159-5 (ISBN)
    Konferanse
    4th Western European Workshop on Research in Cryptology, WEWoRC 2011, Weimar, Germany, July 20-22, 2011
    Prosjekter
    ICG QC
    Tilgjengelig fra: 2012-10-18 Laget: 2012-10-17 Sist oppdatert: 2018-01-31
    2. Vulnerability of "A Novel Protocol-Authentication Algorithm Ruling out a Man-in-the-Middle Attack in Quantum Cryptography"
    Åpne denne publikasjonen i ny fane eller vindu >>Vulnerability of "A Novel Protocol-Authentication Algorithm Ruling out a Man-in-the-Middle Attack in Quantum Cryptography"
    2009 (engelsk)Inngår i: International Journal of Quantum Information, ISSN 0219-7499, Vol. 7, nr 5, s. 1047-1052Artikkel i tidsskrift (Fagfellevurdert) Published
    Abstract [en]

    In this paper, we review and comment on "A novel protocol-authentication algorithm ruling out a man-in-the-middle attack in quantum cryptography" [M. Peev et al., Int. J. Quant. Inf. 3 (2005) 225]. In particular, we point out that the proposed primitive is not secure when used in a generic protocol, and needs additional authenticating properties of the surrounding quantum-cryptographic protocol.

    Emneord
    Quantum cryptography, quantum key distribution, authentication
    HSV kategori
    Identifikatorer
    urn:nbn:se:liu:diva-20405 (URN)10.1142/S0219749909005754 (DOI)
    Prosjekter
    ICG QC
    Tilgjengelig fra: 2009-09-08 Laget: 2009-09-07 Sist oppdatert: 2019-08-15bibliografisk kontrollert
    3. Attacks on quantum key distribution protocols that employ non-ITS authentication
    Åpne denne publikasjonen i ny fane eller vindu >>Attacks on quantum key distribution protocols that employ non-ITS authentication
    Vise andre…
    2016 (engelsk)Inngår i: Quantum Information Processing, ISSN 1570-0755, E-ISSN 1573-1332, Vol. 15, nr 1, s. 327-362Artikkel i tidsskrift (Fagfellevurdert) Published
    Abstract [en]

    We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not Information-Theoretically Secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a set of messages that she can calculate by finding collisions of a cryptographic hash function. However, when this authentication code was introduced it was shown to prevent straightforward Man-In-The-Middle (MITM) attacks against QKD protocols.

    In this paper, we prove that the set of messages that collide with any given message under this authentication code contains with high probability a message that has small Hamming distance to any other given message. Based on this fact we present extended MITM attacks against different versions of BB84 QKD protocols using the addressed authentication code; for three protocols we describe every single action taken by the adversary. For all protocols the adversary can obtain complete knowledge of the key, and for most protocols her success probability in doing so approaches unity.

    Since the attacks work against all authentication methods which allow to calculate colliding messages, the underlying building blocks of the presented attacks expose the potential pitfalls arising as a consequence of non-ITS authentication in QKDpostprocessing. We propose countermeasures, increasing the eavesdroppers demand for computational power, and also prove necessary and sufficient conditions for upgrading the discussed authentication code to the ITS level.

    sted, utgiver, år, opplag, sider
    Springer Publishing Company, 2016
    HSV kategori
    Identifikatorer
    urn:nbn:se:liu:diva-91260 (URN)10.1007/s11128-015-1160-4 (DOI)000372876800020 ()
    Prosjekter
    ICG QC
    Merknad

    Vid tiden för disputation förelåg publikationen som manuskript

    Funding agencies: Vienna Science and Technology Fund (WWTF) [ICT10-067]; Austrian Research Promotion Agency (FFG) [Bridge-2364544]

    Tilgjengelig fra: 2013-04-18 Laget: 2013-04-18 Sist oppdatert: 2019-08-15bibliografisk kontrollert
    4. On Security of Universal Hash Function Based Multiple Authentication
    Åpne denne publikasjonen i ny fane eller vindu >>On Security of Universal Hash Function Based Multiple Authentication
    2012 (engelsk)Inngår i: Lecture Notes in Computer Science, Vol. 7618 / [ed] Chim, Tat Wing and Yuen, Tsz Hon, 2012, s. 303-310Konferansepaper, Publicerat paper (Fagfellevurdert)
    Abstract [en]

    Universal hash function based multiple authentication was originally proposed by Wegman and Carter in 1981. In this authentication, a series of messages are authenticated by first hashing each message by a fixed (almost) strongly universal$_2$ hash function and then encrypting the hash value with a preshared one-time pad. This authentication is unconditionally secure. In this paper, we show that the unconditional security cannot be guaranteed if the hash function output for the first message is not encrypted, as remarked in [Atici and Stinson, CRYPTO '96. LNCS, vol. 1109]. This means that it is not only sufficient, but also necessary, to encrypt the hash of every message to be authenticated in order to have unconditional security. The security loss is demonstrated by a simple existential forgery attack.

    Serie
    Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349 ; 7618
    HSV kategori
    Identifikatorer
    urn:nbn:se:liu:diva-84732 (URN)10.1007/978-3-642-34129-8_27 (DOI)978-3-642-34128-1 (ISBN)978-3-642-34129-8 (ISBN)
    Konferanse
    14th International Conference on Information and Communications Security, ICICS 2012, Hong Kong, China, October 29-31, 2012
    Prosjekter
    ICG QC
    Tilgjengelig fra: 2012-10-18 Laget: 2012-10-18 Sist oppdatert: 2018-02-12
    5. Direct proof of security of Wegman-Carter authentication with partially known key
    Åpne denne publikasjonen i ny fane eller vindu >>Direct proof of security of Wegman-Carter authentication with partially known key
    2014 (engelsk)Inngår i: Quantum Information Processing, ISSN 1570-0755, E-ISSN 1573-1332, Vol. 13, nr 10, s. 2155-2170Artikkel i tidsskrift (Fagfellevurdert) Published
    Abstract [en]

    Information-theoretically secure (ITS) authentication is needed in Quantum Key Distribution (QKD). In this paper, we study security of an ITS authentication scheme proposed by Wegman& Carter, in the case of partially known authentication key. This scheme uses a new authentication key in each authentication attempt, to select a hash function from an Almost Strongly Universal2 hash function family. The partial knowledge of the attacker is measured as the trace distance between the authentication key distribution and the uniform distribution; this is the usual measure in QKD. We provide direct proofs of security of the scheme, when using partially known key, first in the information-theoretic setting and then in terms of witness indistinguishability as used in the Universal Composability (UC) framework. We find that if the authentication procedure has a failure probability ε and the authentication key has an ε´ trace distance to the uniform, then under ITS, the adversary’s success probability conditioned on an authentic message-tag pair is only bounded by ε +|Ƭ|ε´, where |Ƭ| is the size of the set of tags. Furthermore, the trace distance between the authentication key distribution and the uniform increases to |Ƭ|ε´ after having seen an authentic message-tag pair. Despite this, we are able to prove directly that the authenticated channel is indistinguishable from an (ideal) authentic channel (the desired functionality), except with probability less than ε + ε´. This proves that the scheme is (ε + ε´)-UC-secure, without using the composability theorem.

    sted, utgiver, år, opplag, sider
    Springer, 2014
    Emneord
    Authentication, Strongly Universal hash functions, Partially known key, Trace distance, Universal Composability, Quantum Key Distribution.
    HSV kategori
    Identifikatorer
    urn:nbn:se:liu:diva-91264 (URN)10.1007/s11128-013-0641-6 (DOI)000341842000002 ()
    Prosjekter
    ICG QC
    Tilgjengelig fra: 2013-04-18 Laget: 2013-04-18 Sist oppdatert: 2017-12-06bibliografisk kontrollert
    Fulltekst (pdf)
    Authentication in Quantum Key Distribution: Security Proof and Universal Hash Functions
    Download (pdf)
    omslag
  • 60. Bestill onlineKjøp publikasjonen >>
    Abidin, Aysajan
    Linköpings universitet, Matematiska institutionen, Tillämpad matematik. Linköpings universitet, Tekniska högskolan.
    Weaknesses of Authentication in Quantum Cryptography and Strongly Universal Hash Functions2010Licentiatavhandling, med artikler (Annet vitenskapelig)
    Abstract [en]

    Authentication is an indispensable part of Quantum Cryptography, which is an unconditionally secure key distribution technique based on the laws of nature. Without proper authentication, Quantum Cryptography is vulnerable to “man-in-the-middle” attacks. Therefore, to guarantee unconditional security of any Quantum Cryptographic protocols, the authentication used must also be unconditionally secure. The standard in Quantum Cryptography is to use theWegman-Carter authentication, which is unconditionally secure and is based on the idea of universal hashing.

    In this thesis, we first investigate properties of a Strongly Universal hash function family to facilitate understanding the properties of (classical) authentication used in Quantum Cryptography. Then, we study vulnerabilities of a recently proposed authentication protocol intended to rule out a "man-in-the-middle" attack on Quantum Cryptography. Here, we point out that the proposed authentication primitive is not secure when used in a generic Quantum Cryptographic protocol. Lastly, we estimate the lifetime of authentication using encrypted tags when the encryption key is partially known. Under simplifying assumptions, we derive that the lifetime is linearly dependent on the length of the authentication key. Experimental results that support the theoretical results are also presented.

    Delarbeid
    1. Special Properties of Strongly Universal2 Hash Functions Important in Quantum Cryptography
    Åpne denne publikasjonen i ny fane eller vindu >>Special Properties of Strongly Universal2 Hash Functions Important in Quantum Cryptography
    2009 (engelsk)Inngår i: AIP Conference Proceedings, ISSN 0094-243X, Foundations of Probability and Physics—5, Växjö, augusti 2008, New York: American Institute of Physics , 2009, Vol. 1101, s. 289-293Konferansepaper, Publicerat paper (Fagfellevurdert)
    Abstract [en]

    Secure message authentication is an important part of Quantum Key Distribution. In this paper we analyze special properties of a Strongly Universal2 hash function family, an understanding of which is important in the security analysis of the authentication used in Quantum Cryptography. We answer the following question: How much of Alices message does Eve need to influence so that the message along with its tag will give her enough information to create the correct tag for her message?

    sted, utgiver, år, opplag, sider
    New York: American Institute of Physics, 2009
    Emneord
    Quantum cryptography, Quantum theory, Probability
    HSV kategori
    Identifikatorer
    urn:nbn:se:liu:diva-18738 (URN)10.1063/1.3109951 (DOI)
    Konferanse
    Foundations of Probability and Physics—5, Växjö, augusti 2008
    Prosjekter
    ICG QC
    Tilgjengelig fra: 2009-06-03 Laget: 2009-06-03 Sist oppdatert: 2016-08-31
    2. Vulnerability of "A Novel Protocol-Authentication Algorithm Ruling out a Man-in-the-Middle Attack in Quantum Cryptography"
    Åpne denne publikasjonen i ny fane eller vindu >>Vulnerability of "A Novel Protocol-Authentication Algorithm Ruling out a Man-in-the-Middle Attack in Quantum Cryptography"
    2009 (engelsk)Inngår i: International Journal of Quantum Information, ISSN 0219-7499, Vol. 7, nr 5, s. 1047-1052Artikkel i tidsskrift (Fagfellevurdert) Published
    Abstract [en]

    In this paper, we review and comment on "A novel protocol-authentication algorithm ruling out a man-in-the-middle attack in quantum cryptography" [M. Peev et al., Int. J. Quant. Inf. 3 (2005) 225]. In particular, we point out that the proposed primitive is not secure when used in a generic protocol, and needs additional authenticating properties of the surrounding quantum-cryptographic protocol.

    Emneord
    Quantum cryptography, quantum key distribution, authentication
    HSV kategori
    Identifikatorer
    urn:nbn:se:liu:diva-20405 (URN)10.1142/S0219749909005754 (DOI)
    Prosjekter
    ICG QC
    Tilgjengelig fra: 2009-09-08 Laget: 2009-09-07 Sist oppdatert: 2019-08-15bibliografisk kontrollert
    Fulltekst (pdf)
    Weaknesses of Authentication inQuantum Cryptography and Strongly Universal Hash Functions
    Download (pdf)
    Cover
  • 61.
    Abidin, Aysajan
    et al.
    Linköpings universitet, Institutionen för systemteknik, Informationskodning. Linköpings universitet, Tekniska högskolan.
    Larsson, Jan-Åke
    Linköpings universitet, Institutionen för systemteknik, Informationskodning. Linköpings universitet, Tekniska högskolan.
    Direct proof of security of Wegman-Carter authentication with partially known key2014Inngår i: Quantum Information Processing, ISSN 1570-0755, E-ISSN 1573-1332, Vol. 13, nr 10, s. 2155-2170Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Information-theoretically secure (ITS) authentication is needed in Quantum Key Distribution (QKD). In this paper, we study security of an ITS authentication scheme proposed by Wegman& Carter, in the case of partially known authentication key. This scheme uses a new authentication key in each authentication attempt, to select a hash function from an Almost Strongly Universal2 hash function family. The partial knowledge of the attacker is measured as the trace distance between the authentication key distribution and the uniform distribution; this is the usual measure in QKD. We provide direct proofs of security of the scheme, when using partially known key, first in the information-theoretic setting and then in terms of witness indistinguishability as used in the Universal Composability (UC) framework. We find that if the authentication procedure has a failure probability ε and the authentication key has an ε´ trace distance to the uniform, then under ITS, the adversary’s success probability conditioned on an authentic message-tag pair is only bounded by ε +|Ƭ|ε´, where |Ƭ| is the size of the set of tags. Furthermore, the trace distance between the authentication key distribution and the uniform increases to |Ƭ|ε´ after having seen an authentic message-tag pair. Despite this, we are able to prove directly that the authenticated channel is indistinguishable from an (ideal) authentic channel (the desired functionality), except with probability less than ε + ε´. This proves that the scheme is (ε + ε´)-UC-secure, without using the composability theorem.

    Fulltekst (pdf)
    fulltext
  • 62.
    Abidin, Aysajan
    et al.
    Linköpings universitet, Matematiska institutionen, Tillämpad matematik. Linköpings universitet, Tekniska högskolan.
    Larsson, Jan-Åke
    Linköpings universitet, Matematiska institutionen, Tillämpad matematik. Linköpings universitet, Tekniska högskolan.
    Special Properties of Strongly Universal2 Hash Functions Important in Quantum Cryptography2009Inngår i: AIP Conference Proceedings, ISSN 0094-243X, Foundations of Probability and Physics—5, Växjö, augusti 2008, New York: American Institute of Physics , 2009, Vol. 1101, s. 289-293Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Secure message authentication is an important part of Quantum Key Distribution. In this paper we analyze special properties of a Strongly Universal2 hash function family, an understanding of which is important in the security analysis of the authentication used in Quantum Cryptography. We answer the following question: How much of Alices message does Eve need to influence so that the message along with its tag will give her enough information to create the correct tag for her message?

  • 63.
    Abidin, Aysajan
    et al.
    Linköpings universitet, Matematiska institutionen, Tillämpad matematik. Linköpings universitet, Tekniska högskolan.
    Larsson, Jan-Åke
    Linköpings universitet, Matematiska institutionen, Tillämpad matematik. Linköpings universitet, Tekniska högskolan.
    Vulnerability of "A Novel Protocol-Authentication Algorithm Ruling out a Man-in-the-Middle Attack in Quantum Cryptography"2009Inngår i: International Journal of Quantum Information, ISSN 0219-7499, Vol. 7, nr 5, s. 1047-1052Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    In this paper, we review and comment on "A novel protocol-authentication algorithm ruling out a man-in-the-middle attack in quantum cryptography" [M. Peev et al., Int. J. Quant. Inf. 3 (2005) 225]. In particular, we point out that the proposed primitive is not secure when used in a generic protocol, and needs additional authenticating properties of the surrounding quantum-cryptographic protocol.

    Fulltekst (pdf)
    Vulnerability of "A Novel Protocol-Authentication Algorithm Ruling out a Man-in-the-Middle Attack in Quantum Cryptography"
  • 64.
    Abidin, Aysajan
    et al.
    Linköpings universitet, Institutionen för systemteknik, Informationskodning. Linköpings universitet, Tekniska högskolan.
    Pacher, Christoph
    Austrian Institute of Technology, Austria.
    Lorünser, Thomas
    Austrian Institute of Technology, Austria.
    Larsson, Jan-Åke
    Linköpings universitet, Institutionen för systemteknik, Informationskodning. Linköpings universitet, Tekniska högskolan.
    Peev, Momtchil
    Austrian Institute of Technology, Austria.
    Quantum cryptography and authentication with low key-consumption2011Inngår i: Proceedings of SPIE - The International Society for Optical Engineering, 2011, s. 818916-Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Quantum Key Distribution (QKD - also referred to as Quantum Cryptography) is a technique for secret key agreement. It has been shown that QKD rigged with Information-Theoretic Secure (ITS) authentication (using secret key) of the classical messages transmitted during the key distribution protocol is also ITS. Note, QKD without any authentication can trivially be broken by man-in-the-middle attacks. Here, we study an authentication method that was originally proposed because of its low key consumption; a two-step authentication that uses a publicly known hash function, followed by a secret strongly universal2 hash function, which is exchanged each round. This two-step authentication is not information-theoretically secure but it was argued that nevertheless it does not compromise the security of QKD. In the current contribution we study intrinsic weaknesses of this approach under the common assumption that the QKD adversary has access to unlimited resources including quantum memories. We consider one implementation of Quantum Cryptographic protocols that use such authentication and demonstrate an attack that fully extract the secret key. Even including the final key from the protocol in the authentication does not rule out the possibility of these attacks. To rectify the situation, we propose a countermeasure that, while not informationtheoretically secure, restores the need for very large computing power for the attack to work. Finally, we specify conditions that must be satisfied by the two-step authentication in order to restore informationtheoretic security.

  • 65. Abom, A.E.
    et al.
    Comini, E.
    Dipto. di Chim. e Fis. dei Materaili, INFM, Università di Brescia, Via Valotti 9, I-251 33 Brescia, Italy.
    Sberveglieri, G.
    Dipto. di Chim. e Fis. dei Materaili, INFM, Università di Brescia, Via Valotti 9, I-251 33 Brescia, Italy.
    Finnegan, N.
    Ctr. for Microanalysis of Materials, Frederick Seitz Mat. Res. Laboratory, University of Illinois, Urbana, IL 61801, United States.
    Petrov, I.
    Ctr. for Microanalysis of Materials, Frederick Seitz Mat. Res. Laboratory, University of Illinois, Urbana, IL 61801, United States.
    Hultman, Lars
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för fysik, kemi och biologi, Tunnfilmsfysik.
    Erikssion, M.
    Experimental evidence for a dissociation mechanism in NH3 detection with MIS field-effect devices2003Inngår i: Sensors and actuators. B, Chemical, ISSN 0925-4005, E-ISSN 1873-3077, Vol. 89, nr 1-2Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    The gas response mechanism of ammonia detection with Pt-based metal-insulator-semiconductor (MIS) field-effect sensors was investigated. An experimental model system was designed which compares the responses of thick continuous Pt layers with controlled morphology and surface chemical composition, with the response of thin, discontinuous layers. The surface of a thick, continuous sputter-deposited Pt film is modified, either by (i) the deposition of a thin SiO2 overlayer, (ii) reactive sputter deposition of PtOx, or (iii) co-deposition of Pt with SiO2 in Ar + O2 atmospheres. We show that the ammonia response is caused by the formation of atomic hydrogen through the dissociation of NH3 at temperatures <200 °C. It is found that the modified surfaces exhibit increased ammonia selectivity compared to a pure Pt film. Results from this work indicate that the reason for the changed selectivity is the appearance of an oxidized PtOx phase or triple phase boundaries between Pt, SiO2 and the ambient gas, rather than for solely morphological reasons. © 2002 Elsevier Science B.V. All rights reserved.

  • 66. Abom, A.E.
    et al.
    Comini, E.
    Sberveglieri, G.
    Hultman, Lars
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för fysik, kemi och biologi, Tunnfilmsfysik.
    Eriksson, Mats
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för fysik, kemi och biologi, Tillämpad Fysik.
    Thin oxide films as surface modifiers of MIS field effect gas sensors2002Inngår i: Sensors and actuators. B, Chemical, ISSN 0925-4005, E-ISSN 1873-3077, Vol. 85, nr 1-2, s. 109-119Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    The catalytic activity at the surface of Pt based MIS field effect gas sensors is modified by the deposition of thin films of SnO2, Al2O3 and SiO2, grown by reactive sputtering. It is found that a very thin layer (<10 nm) of SiO2 and SnO2 changes the catalytic activity towards higher NH3 selectivity, but with thicker films the sensor response vanishes. Since the response mechanism for these sensors is dependent on dissociation of molecules, it is likely that at low temperatures (140 °C), neither dissociation on nor transport/diffusion through the thicker films takes place. However, with Pt in conjunction with SiO2 or SnO2, the surface reactions will be altered, with enhanced NH3 selectivity as a result. A thin film of Al2O3, on the other hand, has a much smaller influence on the gas response to the test gases used in this work. Furthermore the sputtering process is found to strongly influence the sensor responses, and specifically reduce the sensitivity of the sensor. A thin intermediate layer of evaporated Pt does not completely protect the underlying structure from sputter induced damage. © 2002 Elsevier Science B.V. All rights reserved.

  • 67. Abom, A.E.
    et al.
    Haasch, R.T.
    Frederick Seitz Mat. Res. Laboratory, University of Illinois, Urbana, IL 61801, United States.
    Hellgren, N.
    Frederick Seitz Mat. Res. Laboratory, University of Illinois, Urbana, IL 61801, United States.
    Finnegan, N.
    Frederick Seitz Mat. Res. Laboratory, University of Illinois, Urbana, IL 61801, United States.
    Hultman, Lars
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för fysik, kemi och biologi, Tunnfilmsfysik.
    Eriksson, Mats
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för fysik, kemi och biologi, Tillämpad Fysik.
    Characterization of the metal-insulator interface of field-effect chemical sensors2003Inngår i: Journal of Applied Physics, ISSN 0021-8979, E-ISSN 1089-7550, Vol. 93, nr 12, s. 9760-9768Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    The metal-insulator interface of hydrogen-sensitive metal-insulator-semiconductor capacitors, with SiO2 as the insulator and Pt as the metal contact, was discussed. It was found that the difference in hydrogen response between differently prepared devices was explained by a difference in concentration of available adsorption sites. The analysis showed that the concentration of Pt atoms in contact with the oxide affected both the hydrogen response and the metal-oxide adhesion.

  • 68. Abom, A.E.
    et al.
    Persson, Per
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för fysik, kemi och biologi, Tunnfilmsfysik.
    Hultman, Lars
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för fysik, kemi och biologi, Tunnfilmsfysik.
    Eriksson, Mats
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för fysik, kemi och biologi, Tillämpad Fysik.
    Influence of gate metal film growth parameters on the properties of gas sensitive field-effect devices2002Inngår i: Thin Solid Films, ISSN 0040-6090, E-ISSN 1879-2731, Vol. 409, nr 2, s. 233-242Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Thin films of Pt have been grown as gate metals on the oxide surface of gas sensitive field-effect devices. Both electron beam evaporation and dc magnetron sputtering has been used. The energy of the impinging Pt atoms, the substrate temperature and the thickness of the Pt film were used as parameters in this study. The influence of the growth parameters on the gas response has been investigated and compared with the properties of the films, studied by transmission electron microscopy, Auger electron spectroscopy, X-ray photoelectron spectroscopy and X-ray diffraction. The conditions during growth of the Pt film are found to have a large impact on the properties of the device. As expected, crystallinity, morphology and the metal/substrate interfacial structure are also affected by processing parameters. Three different growth processes stand out as the most promising from gas sensor considerations, namely room temperature evaporation, sputtering at high pressures and sputtering at high temperatures. The correlation between gas responses and properties of the gas sensitive layer is discussed. © 2002 Elsevier Science B.V. All rights reserved.

  • 69. Bestill onlineKjøp publikasjonen >>
    Abouzeedan, Adli
    Linköpings universitet, Institutionen för ekonomisk och industriell utveckling. Linköpings universitet, Tekniska högskolan.
    SME Performance and Its Relationship to Innovation2011Doktoravhandling, med artikler (Annet vitenskapelig)
    Abstract [en]

    Current SME performance models suffer from a number of disadvantages. The models use intensively a business ratio approach, they look at SMEs as a homogenous group, they consider firms to be closed systems, they do not directly incorporate the impact of an enterprise’s innovation activities, and finally they are complex and rely on sophisticated statistical refining methods making them unpractical to use by SME managers. There are four major challenges when one tries to build SME performance models that lack these deficiencies. The first challenge is that the desired performance evaluation model must optimally incorporate both quantitative and qualitative input. The second challenge is that the model must incorporate non-financial input parameters, such as firm size and age (among others), in the performance evaluation models. The third is that the model must consider the variety of SMEs as concerns their business sectors, nationalities, sizes, and ages. The final challenge is that the model must be able to utilize existing limited information available from the SMEs bookkeeping practices in an optimal way.

    The thesis addresses three questions related to constructing a better SMEperformance model, namely (1) What are the advantages and disadvantages of the existing models used in evaluating SME performance? (2) What characterizes a comprehensive model for measuring SME performance with acknowledgement of the firm’s innovation activities? (3) How can a firm’s innovation activities be enhanced in relation to the firm’s external environment?

    To construct a model that copes with these challenges, I used a literature-based selection of parameters as well as a theory-based selection. I used both a conceptual approach and an empirical approach to discuss and propose a model, the Survival Index Value (or SIV) model, as an alternative to the existing performance models for SMEs.

    The major contributions of this thesis to the field of SME performance can be summarized in three outcomes: the SIV model as a new model of SME performance evaluation, the ASPEM as a new tool for strategic utilization of SME performance models, and a new approach to account for innovation in relation to the external environment of the firm using the IBAM tool.

    The work adds to the theory of the firm, as it presents a new way of evaluating firm performance. It also contributes to bridging the theory of the firm to organizational theory, by elevating the significance of networking and its impact on SME efficiency.

    Delarbeid
    1. Typology Analysis of Performance Models of Small and Medium-Size Enterprises (SMEs)
    Åpne denne publikasjonen i ny fane eller vindu >>Typology Analysis of Performance Models of Small and Medium-Size Enterprises (SMEs)
    2004 (engelsk)Inngår i: International Journal of Entrepreneurship, ISSN 1099-9264, E-ISSN 1939-4675, Vol. 2, nr 1-2, s. 155-177Artikkel i tidsskrift (Fagfellevurdert) Published
    Abstract [en]

    A number of firm performance models are available. Reviewing these models and pointing out their individual strengths and weaknesses, would help both academic researchers and professional users to understand and appreciate how and when to use these various models. The theoretical models for Small and Medium-size Enterprise (SME) performance can be divided into two categories: firm dynamics theories and performance prediction models. In the first part of this paper we review, in a condensed manner, the most relevant firm dynamic theories, i.e. SME's performance models. These include: Stochastic Theories, Learning Model Theories and Hazard Modeling Theories. In the second part of this paper, we examine the performance prediction models of SMEs, which include Z-Scores, ZETA-Scores, Neural Networks (NN) and the SIV® models, among others. The strengths and weaknesses of each of these models are exposed and discussed.

    sted, utgiver, år, opplag, sider
    SpringerLink, 2004
    Emneord
    small and medium-size enterprises - survival index value - SIV® model - Z-scores - neural networks
    HSV kategori
    Identifikatorer
    urn:nbn:se:liu:diva-71336 (URN)10.1023/B:JIEN.0000026911.03396.2d (DOI)
    Tilgjengelig fra: 2011-10-12 Laget: 2011-10-12 Sist oppdatert: 2017-12-08bibliografisk kontrollert
    2. ASPEM as the New Topographic Analysis Tool for Small and Medium-Sized Enterprises (SMEs) Performance Models Utilization
    Åpne denne publikasjonen i ny fane eller vindu >>ASPEM as the New Topographic Analysis Tool for Small and Medium-Sized Enterprises (SMEs) Performance Models Utilization
    2005 (engelsk)Inngår i: International Journal of Entrepreneurship, ISSN 1099-9264, E-ISSN 1939-4675, Vol. 3, nr 1, s. 53-70Artikkel i tidsskrift (Fagfellevurdert) Published
    Abstract [en]

    Quantifying and measuring small firm performance is vital in our understanding of how internationalization influences firm performance. That is also important when attempting to grasp the mechanisms of the internationalization processes. There are few methods used for the evaluation of performance of Small and Medium-sized Enterprise (SMEs). These methods can be either macro or micro economic in nature. Hazard Modeling, Stochastic Models, and Learning Models are examples of macro economic models while Z-Scores, ZETA-Scores, Neural Networks, and the SIV® model are examples of micro models. Choosing the most suitable performance model is an essential step in order to maximize our knowledge in relation to firm performance. Utilizing SMEs performance measures without thinking about the category of model, will bias the outcome of the majority of SMEs studies. However, using firm performance diverse models in an efficient manner requires strategic thinking. In this paper, we are re-introducing a tool that can accommodate that aspect. Abouzeedan (2002) designated the new tool: the Arena of SMEs Performance Models or an ASPEM diagram. The horizontal axis in the diagram indicates the Information Intensity Requirements of the model. The vertical axis indicates the Coverage Intensity of the model varying from an individual firm up to a whole group of firms. By allocating each of the SMEs performance models, at the suitable region of the ASPEM Diagram, researchers can better build a sound strategy for the application of these methods.

    sted, utgiver, år, opplag, sider
    SpringerLink, 2005
    Emneord
    Arena of SMEs performance models, ASPEM - SIV® model, Zeta-scores, ZETA-scores, neural networks, stochastic theories, hazard modeling
    HSV kategori
    Identifikatorer
    urn:nbn:se:liu:diva-71337 (URN)10.1007/s10843-005-0305-4 (DOI)
    Tilgjengelig fra: 2011-10-12 Laget: 2011-10-12 Sist oppdatert: 2017-12-08bibliografisk kontrollert
    3. Analysis of Swedish Fishery Company Using SIV® Model: A Case Study
    Åpne denne publikasjonen i ny fane eller vindu >>Analysis of Swedish Fishery Company Using SIV® Model: A Case Study
    2004 (engelsk)Inngår i: Journal of Enterprising Culture, ISSN 0218-4958, Vol. 12, nr 4, s. 277-301Artikkel i tidsskrift (Fagfellevurdert) Published
    Abstract [en]

    In his original work of the Survival Index Value (SIV®) model, Dr. Adli Abouzeedan proposed a new parameter, which he named as the Survival Index (SI) (see Abouzeedan, 2001; Abouzeedan and Busler, 2002a). The new parameter is used to evaluate the performance of Small and Medium-size Enterprises (SMEs) utilizing firm survivability as an indicator. The SI is calculated using an equation known as Survival Index (SI) Value Equation or SIE. In this paper, we applied the SIV® model to run an analysis on a very young Swedish firm and up to our knowledge, for the first time. The firm is a small one, working within a business sector defined as "fish preparation industry". This particular enterprise had a bad performance through its short life. The purpose of this study is to truly determine if the SIV® model has the capacity to indicate the performance of the firm. The case study presented in this work showed the valuable analytical power of the new model since it succeeded in giving a clear indication of the worsening situation of the enterprise. During the SIV® analysis of this Swedish firm new concepts have been introduced which do increase the practicality and analytical capacity of the model.

    sted, utgiver, år, opplag, sider
    World Scientific Publishing Co., 2004
    HSV kategori
    Identifikatorer
    urn:nbn:se:liu:diva-71340 (URN)10.1142/S0218495804000154 (DOI)
    Tilgjengelig fra: 2011-10-12 Laget: 2011-10-12 Sist oppdatert: 2017-12-08bibliografisk kontrollert
    4. Innovation Balance Matrix: an application in the Arab countries
    Åpne denne publikasjonen i ny fane eller vindu >>Innovation Balance Matrix: an application in the Arab countries
    2006 (engelsk)Inngår i: World Review of Entrepreneurship, Management and Sustainable Development, ISSN 1746-0573, E-ISSN 1746-0581, Vol. 2, nr 3, s. 270-280Artikkel i tidsskrift (Fagfellevurdert) Published
    Abstract [en]

    Economies have different levels of entrepreneurial activities depending on the availability of tangible as well as intangible resources. In their working paper, Abouzeedan and Busler (2004) established a new type of capital, adding up the components of the most important types of capital. These are the human capital, financial capital and the system capital. In that paper, the two researchers defined each of the components and explained what they meant with those terminologies. They called this new type of capital, innovation capital. The two researchers have argued that innovation capital can be used as an indicator for the degree of richness of the entrepreneurial environment in a region and thus the general character of the economy. They also introduced the Innovation Balance Matrix or IBAM as an analytical tool to classify economies based on their entrepreneurial conditions. In this extended work, they have used this analysis and tried to apply it to Arab countries using a general knowledge and deductive approach to the issue. They conclude the paper with some recommendations as how to enrich the innovation capital in that region.

    sted, utgiver, år, opplag, sider
    Inderscience Enterprises Limited, 2006
    Emneord
    Human capital; financial capital; system capital; innovation capital; innovation balance matrix; IBAM; Arab countries; Middle East; entrepreneurship.
    HSV kategori
    Identifikatorer
    urn:nbn:se:liu:diva-71341 (URN)10.1504/WREMSD.2006.009893 (DOI)
    Tilgjengelig fra: 2011-10-12 Laget: 2011-10-12 Sist oppdatert: 2017-12-08bibliografisk kontrollert
    5. Entrepreneurial policies and the innovation balance matrix: the case of the Arab countries
    Åpne denne publikasjonen i ny fane eller vindu >>Entrepreneurial policies and the innovation balance matrix: the case of the Arab countries
    2007 (engelsk)Inngår i: Science,Technology and Sustainability in the Middle East and North Africa: Section III: Science Technology and Innovation / [ed] Allam Ahmed, Inderscience Enterprises Limited , 2007, s. 158-175Kapittel i bok, del av antologi (Fagfellevurdert)
    Abstract [en]

    The issue of the connection between economic progress and the entrepreneurial environment has been investigated by researchers using diverse approaches. One way to investigate the question is to use deductive analysis regarding the forms of capital contributing to the entrepreneurial environment of society. Adli Abouzeedan and Michael Busler were the first to introduce the concept of 'Innovation Capital'. The two researchers argued that Innovation Capital can be used as an indicator for the degree of richness of the entrepreneurial environment. In the same paper, the researchers also introduced the Innovation Balance Matrix (IBAM) as an analytical tool to classify economies based on their entrepreneurial conditions, applying it across the globe. In a later work, the two researchers tried to run a similar IBAM analysis focusing on the Arab world. The two writers found that the best solution to the lack of individual entrepreneurial economies in that region is through what they called the 'additive solution'. In this work, we take their argument deeper and look at the kind of policies that would achieve that solution.

    sted, utgiver, år, opplag, sider
    Inderscience Enterprises Limited, 2007
    Serie
    Globalisation, Technology and Sustainable Development Book Series
    HSV kategori
    Identifikatorer
    urn:nbn:se:liu:diva-71342 (URN)0-907776-30-2 (ISBN)0-907776-32-9 (ISBN)
    Tilgjengelig fra: 2011-10-12 Laget: 2011-10-12 Sist oppdatert: 2011-11-21bibliografisk kontrollert
    6. Managing Innovation in a Globalised Economy: Defining the Open Capital
    Åpne denne publikasjonen i ny fane eller vindu >>Managing Innovation in a Globalised Economy: Defining the Open Capital
    2009 (engelsk)Inngår i: World Sustainable Development Outlook 2009. The Impact of the Global Financial Crisis on the Environment, Energy and Sustainable Development / [ed] Allam Ahmed, World Association for Sustainable Development , 2009, s. 287-294Kapittel i bok, del av antologi (Fagfellevurdert)
    Abstract [en]

    Economies develop different levels of entrepreneurial capacity depending on the degree of availability of tangible as well as intangible resources. In an earlier work by Abouzeedan and Busler (2006), a new type of capital, that is, innovation capital, has been suggested to serve as an indicator for the degree of richness of the entrepreneurial environment in an economy. Innovation capital incorporates the concepts of human capital, financial capital and system capital. However, the issue of accessibility and openness in the innovation process also need to be reflected in the innovation capital concept. Innovation activities in the modern economies are growing to become more interconnected and open in their nature. In this paper, we defined and incorporated a new component within the innovation capital, namely open capital. We also reflected on how the four components of the innovation capital concept, including the open capital, are interconnected.

    sted, utgiver, år, opplag, sider
    World Association for Sustainable Development, 2009
    Emneord
    Open Capital, Human Capital, Financial Capital, System Capital, Innovation Capital, Open Innovation, Open Innovation Management
    HSV kategori
    Identifikatorer
    urn:nbn:se:liu:diva-71344 (URN)978-1-907106-05-7 (ISBN)
    Tilgjengelig fra: 2011-10-12 Laget: 2011-10-12 Sist oppdatert: 2011-11-21bibliografisk kontrollert
    7. Analysis of a Swedish High Technology SME Using the Survival Index Value (SIV) Model
    Åpne denne publikasjonen i ny fane eller vindu >>Analysis of a Swedish High Technology SME Using the Survival Index Value (SIV) Model
    2011 (engelsk)Inngår i: Paper Sessions, Workshops and Special Meetings: The 56th ICSB World Conference, Stockholm, Sweden, 15th and 18th of June, ICSB , 2011, s. 170-179Konferansepaper, Publicerat paper (Fagfellevurdert)
    Abstract [en]

    One of the major deficiencies in the existing Small and Medium-sized Enterprises’ (SMEs) performance evaluation models is the fact that they lack a clear coupling to the issue of innovation and its impact on performance. A possible candidate model which could achieve this is the Survival Index Value (SIV) model. The model has a parameter incorporated in its structure, the technology-intake. This parameter can be used as an indicator of the degree of innovativeness of the firm. Previous works using the model looked at general performance without specific focus on innovation activities of the firm and without relating that to aspects of survival and growth. In this paper the aim was to demonstrate the ability of the SIV model to indicate a positive overall performance due to the intensive investment of a selected firm in innovation activities.

    The enterprise analyzed, Autoadapt AB, is a Swedish high technology firm working in adapting cars and automobiles to handicapped people. Due to the nature of their activities the firm has a high level of innovation input to be able to solve the complex problems related to usage of cars by disabled people. Both the product development process and managing the activities around it requires a high level of innovativeness and ingenuity. As thus the firm presented a very interesting object to study. The study has a clear significance as there is a need to differentiate the performance of innovation-intensive enterprises from firms who are using less investment in innovation in their activities. This can be done by considering the investment in new technologies both as product development and/or as investing in absorption of external management, product or process innovation. Applying the SIV model to run this analysis can help to demonstrate the need to incorporate the technology intake as an essential component of SME’s performance model.

    The results indicated that the SIVmodel is able to predict correctly the performance of the object firm. By having mostly positive survival factor values, which are single data-points, during years of operation, and also having mostly positive survivability coefficient values, which are agglomerate data-points, the SIVmodel proved its abilities. Clearly, the model has a good potential to be developed and fine-tuned even more. The SIV model can be tested further to look at deviations in performance of firms among different sectors and relates that to the innovativeness of whole sectors.

    sted, utgiver, år, opplag, sider
    ICSB, 2011
    Emneord
    small and medium-sized enterprises, SMEs, performance evaluation models, SIV model
    HSV kategori
    Identifikatorer
    urn:nbn:se:liu:diva-71345 (URN)978-0-9819028-3-8 (ISBN)0-9819028-3-9 (ISBN)
    Konferanse
    ICSB 2011 World Conference Date: June 15-18, 2011, Stockholm Waterfront Congress Center, Stockholm, Sweden
    Tilgjengelig fra: 2011-10-12 Laget: 2011-10-12 Sist oppdatert: 2016-05-04bibliografisk kontrollert
    Fulltekst (pdf)
    SME Performance and Its Relationship to Innovation
    Download (pdf)
    omslag
  • 70.
    Abouzeedan, Adli
    et al.
    Sahlgrenska Academy, University of Gothenburg, Sweden.
    Klofsten, Magnus
    Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, Projekt, innovationer och entreprenörskap. Linköpings universitet, Tekniska högskolan.
    Hedner, Thomas
    Sahlgrenska Academy, University of Gothenburg, Sweden.
    Analysis of a Swedish High Technology SME Using the Survival Index Value (SIV) Model2011Inngår i: Paper Sessions, Workshops and Special Meetings: The 56th ICSB World Conference, Stockholm, Sweden, 15th and 18th of June, ICSB , 2011, s. 170-179Konferansepaper (Fagfellevurdert)
    Abstract [en]

    One of the major deficiencies in the existing Small and Medium-sized Enterprises’ (SMEs) performance evaluation models is the fact that they lack a clear coupling to the issue of innovation and its impact on performance. A possible candidate model which could achieve this is the Survival Index Value (SIV) model. The model has a parameter incorporated in its structure, the technology-intake. This parameter can be used as an indicator of the degree of innovativeness of the firm. Previous works using the model looked at general performance without specific focus on innovation activities of the firm and without relating that to aspects of survival and growth. In this paper the aim was to demonstrate the ability of the SIV model to indicate a positive overall performance due to the intensive investment of a selected firm in innovation activities.

    The enterprise analyzed, Autoadapt AB, is a Swedish high technology firm working in adapting cars and automobiles to handicapped people. Due to the nature of their activities the firm has a high level of innovation input to be able to solve the complex problems related to usage of cars by disabled people. Both the product development process and managing the activities around it requires a high level of innovativeness and ingenuity. As thus the firm presented a very interesting object to study. The study has a clear significance as there is a need to differentiate the performance of innovation-intensive enterprises from firms who are using less investment in innovation in their activities. This can be done by considering the investment in new technologies both as product development and/or as investing in absorption of external management, product or process innovation. Applying the SIV model to run this analysis can help to demonstrate the need to incorporate the technology intake as an essential component of SME’s performance model.

    The results indicated that the SIVmodel is able to predict correctly the performance of the object firm. By having mostly positive survival factor values, which are single data-points, during years of operation, and also having mostly positive survivability coefficient values, which are agglomerate data-points, the SIVmodel proved its abilities. Clearly, the model has a good potential to be developed and fine-tuned even more. The SIV model can be tested further to look at deviations in performance of firms among different sectors and relates that to the innovativeness of whole sectors.

  • 71.
    Abouzeedan, Adli
    et al.
    University of Gothenburg.
    Klofsten, Magnus
    Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, Projekt, innovationer och entreprenörskap. Linköpings universitet, Tekniska högskolan.
    Hedner, Thomas
    University of Gothenburg.
    Implementing the SIV Model on an Intensively Innovation-Oriented Firm: The Case of Autoadapt AB2012Inngår i: World Journal of Entrepreneurship, Management and Sustainable Development, ISSN 2042-5961, Vol. 8, nr 2/3, s. 122-145Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Small to medium-sized enterprise (SME) evaluation models lack a clear coupling to innovation and its impact on firm performance. A model which can achieve this is the Survival Index Value (SIV) model. The purpose of this paper is to demonstrate the ability of the SIV model to indicate and predict the performance of a company. The firm, Autoadapt AB, is an innovation-oriented enterprise, adapting personal cars to be driven by handicapped people. The authors knew in advance about the good performance of the firm and its high efficiency in conducting its operations and expected the SIV model to reflect correctly on Autoadapt's performance. Because the handicap degree of each of the individuals who benefit from the firm activities differs from one person to another, product solutions have to be individually designed. Therefore the firm has had to pursue a high level of innovativeness and it had to abide with this policy right from the start. The product development processes in the firm needed to adapt to such strategies.

    To be able to demonstrate the ability of the SIV model to indicate a positive performance due to the intensive innovation activities of Autoadapt AB, a case study approach was used. Case studies are very suited for in-depth analysis of an object under a longer period of time. It is a widely-used research method in firm performance studies.

    The results of the SIV analysis indicated that the model is able to project correctly the performance of the object firm. At all the four levels of analysis, i.e. SI values, the SPI slope, the survival factors, and the survivability coefficients, the SIV analysis performance indicated a stable positive development of the firm through the life time of the enterprise.

    Measuring performance of SMEs is an important issue. There are couple of models stemming from the traditional accountancy disciplines in use; however these models suffer from clear disadvantages. Recently a new model, the SIV model, was introduced and has shown the ability of being a better candidate for performance analysis. The paper demonstrates the ability of the SIV model to judge correctly the performance of an innovative firm.

  • 72.
    Abraham-Nordling, Mirna
    et al.
    Karolinska institutet.
    Persson, Bengt
    Linköpings universitet, Institutionen för fysik, kemi och biologi, Bioinformatik. Linköpings universitet, Tekniska högskolan.
    Nordling, Erik
    Linköpings universitet, Institutionen för fysik, kemi och biologi, Bioinformatik. Linköpings universitet, Tekniska högskolan.
    Model of the complex of Parathyroid hormone-2receptor and Tuberoinfundibular peptide of39 residues2010Inngår i: BMC Reseach Notes, ISSN 1756-0500, Vol. 3, nr 270Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Background

    We aim to propose interactions between the parathyroid hormone-2 receptor (PTH2R) and its ligand the tuberoinfundibular peptide of 39 residues (TIP39) by constructing a homology model of their complex. The two related peptides parathyroid hormone (PTH) and parathyroid hormone related protein (PTHrP) are compared with the complex to examine their interactions.

    Findings

    In the model, the hydrophobic N-terminus of TIP39 is buried in a hydrophobic part of the central cavity between helices 3 and 7. Comparison of the peptide sequences indicates that the main discriminator between the agonistic peptides TIP39 and PTH and the inactive PTHrP is a tryptophan-phenylalanine replacement. The model indicates that the smaller phenylalanine in PTHrP does not completely occupy the binding site of the larger tryptophan residue in the other peptides. As only TIP39 causes internalisation of the receptor and the primary difference being an aspartic acid in position 7 of TIP39 that interacts with histidine 396 in the receptor, versus isoleucine/histidine residues in the related hormones, this might be a trigger interaction for the events that cause internalisation.

    Conclusions

    A model is constructed for the complex and a trigger interaction for full agonistic activation between aspartic acid 7 of TIP39 and histidine 396 in the receptor is proposed.

    Fulltekst (pdf)
    fulltext
  • 73.
    Abrahamsson, Henrik
    et al.
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för systemteknik.
    Carlson, Peter
    Linköpings universitet, Tekniska högskolan.
    Robust Torque Control for Automated Gear Shifting in Heavy Duty Vehicles2008Independent thesis Advanced level (professional degree), 20 poäng / 30 hpOppgave
    Abstract [en]

    In an automated manual transmission it is desired to have zero torque in the transmission when disengaging a gear. This minimizes the oscillations in the driveline which increases the comfort and makes the speed synchronization easier. The automated manual transmission system in a Scania truck, called Opticruise, uses engine torque control to achieve zero torque in the transmission.In this thesis different control strategies for engine torque control are proposed in order to minimize the oscillations in the driveline and increase the comfort during a gear shift. A model of the driveline is developed in order to evaluate the control strategies. The main focus was to develop controllers that are easy to implement and that are robust enough to be used in different driveline configurations. This means that model dependent control strategies are not considered.A control strategy with a combination of a feedback from the speed difference between the output shaft speed and the wheel speed, and a feedforward with a linear ramp, showed very good performance in both simulations and tests in trucks. The amplitude of the oscillations in the output shaft speed after neutralengagement are halved compared to the results from the existing method in Scania trucks. The new concept is also more robust against initial conditions and time delay estimations.

    Fulltekst (pdf)
    FULLTEXT01
  • 74.
    Abrahamsson, Jesper
    Linköpings universitet, Institutionen för teknik och naturvetenskap. Linköpings universitet, Tekniska högskolan.
    Ett försprång till skapande - en undersökning om förutsättningarna för Musikproduktion på Kulturskolan2008Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [sv]

    Syftet med rapporten är att undersöka förutsättningarna för en introduktionskurs i musikproduktion på Kulturskolan i Karlskrona, samt att utforma en övergripande plan för undervisningen. Arbetet omfattar även en mindre undersökning av eventuella liknande kurser på kulturskolor i tolv större svenska städer. För att besvara frågeställningarna har intervjuer genomförts med lärare och ledning på Kulturskolan i Karlskrona, anställda på kulturskolor på andra orter, musikgymnasium i Karlskrona samt på kommunens kulturförvaltning. Undersökningen visade att endast två av tolv städer har motsvarande eller liknande kurser på sina kulturskolor. De materiella förutsättningarna för en musikproduktionskurs på Kulturskolan i Karlskrona är goda, i form av lokaler med befintlig ljudutrustning och programvara. När det gäller ekonomiska förutsättningar kommer Kulturskolans intäkter från elevavgifter och kommunala medel. Kursen skulle innebära en utgift för lärarlön, men i övrigt går den att starta utan ytterligare kostnader. På kommunens kulturförvaltning menar man att det är viktigt med bredd i Kulturskolans kursutbud och att en musikproduktionskurs kan berika det lokala kulturlivet. Kursen är tänkt att fokusera på musik med datorn. Momenten bör kretsa kring inspelningsprogram, mjukvaruinstrument, plugin-program, med inslag av arrangering och mixning. Kursens målsättningar ligger i linje med Kulturskolans policydokument och är inspirerade av liknande kurser på andra kulturskolor.

    Fulltekst (pdf)
    fulltext
  • 75.
    Abrahamsson, Johan
    Linköpings universitet, Institutionen för teknik och naturvetenskap, Fysik och elektroteknik. Linköpings universitet, Tekniska högskolan.
    Loop impedance measurement tool2020Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    This master´s thesis presents a prototype of a hand-held measurement tool used to measure the loop impedance of ground loops using two current probes. This tool allows the user to find bad shield connections in a system without disconnecting the shielded cables. The thesis explains the theory behind the measurement method, hardware requirements and design, how the software works and a demonstration of the implemented graphical user interface. The tool is powered by a two-cell lithium-ion battery and has an integrated battery charger with cell balancing.

    Fulltekst (pdf)
    fulltext
  • 76.
    Abrahamsson, Kalle
    Linköpings universitet, Institutionen för teknik och naturvetenskap, Kommunikations- och transportsystem. Linköpings universitet, Tekniska högskolan.
    Åtgärd för ökad trafiksäkerhet - Undersökning om behovet av nya säkra övergångar vid Riksväg 51 i Finspång2020Independent thesis Basic level (university diploma), 10,5 poäng / 16 hpOppgave
    Abstract [sv]

    Fordonstrafiken ökar allt mer i Sverige, antalet lastbilstransporter likaså riksväg 51 står inför nybyggnation som ska öka framkomligheten för fordon genom Finspång, men vem tänker på gång och cykeltrafikanterna? Denna rapport undersöker framkomligheten för en problematisk sträcka av Riksväg 51 genom Finspång, där hastighetsbegränsningen är hög och bristen på säkra övergångar är stor. Passageräkning kommer utföras vid två områden för att få svar på hur stort problemet är för Finspångs invånare. Rapporten resulterar i förslag till två nya säkra övergångar, en gångbro vid Postnords kontor i Finspång och en tunnel intill en cirkulationsplats i anslutning till Willys i Finspång. Om kommunen anser att dessa förslag är något att arbeta vidare med är helt upp till dem.

    Fulltekst (pdf)
    fulltext
  • 77. Abrahamsson, Lena
    et al.
    Bengtsson, Lars
    Gremyr, Ida
    Kowalkowski, Christian
    Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, Industriell marknadsföring och industriell ekonomi. Linköpings universitet, Tekniska högskolan.
    Lindahl, Marcus
    Nilsson, Anders
    Rehn, Alf
    Segerstedt, Anders
    Säfsten, Kristina
    Öhman, Peter
    Industriell ekonomi och organisering2016Bok (Fagfellevurdert)
  • 78.
    Abrahamsson, Marcus
    Linköpings universitet, Institutionen för datavetenskap, Databas och informationsteknik. Linköpings universitet, Tekniska högskolan.
    A platform for third-party applications on the web2013Independent thesis Basic level (degree of Bachelor), 10,5 poäng / 16 hpOppgave
    Abstract [en]

    A trend seen on the web today is to create a platform where externally developed applications can run inside some kind of main application. This is often done by providing an API to access data and business logic of your service and a sandbox environment in which third-party applications can run. By providing this, it is made possible for external developers to come up with new ideas based on your service. Some good examples on this are Spotify Apps, Apps on Facebook and SalesForce.com.

    Ipendo Systems AB is a company that develops a web platform for intellectual properties. Currently most things on this platform are developed by developers at Ipendo Systems AB. Some interest has though risen to enable external developers to create applications that will in some way run inside the main platform.

    In this thesis an analysis of already existing solutions has been done. These solutions were Spotify Apps and Apps on Facebook. The two have different approaches on how to enable third-party applications to run inside their own service. Facebook’s solution builds mainly on iframe embedded web pages where data access is provided through a web API. Spotify on the other hand hosts the third-party applications themselves but the applications may only consist of HTML5, CSS3 and JavaScript.

    In addition to the analysis a prototype was developed. The purpose of the prototype was to show possible ways to enable third-party applications to run inside your own service. Two solutions showing this were developed. The first one was based on Facebook’s approach with iframing of external web pages. The second was a slightly modified version of Spotify’s solution with only client-side code hosted by the main application. To safely embed the client side code in the main application a sandboxing tool for JavaScript called Caja was used.

    Of the two versions implemented in the prototype was the Iframe solution considered more ready to be utilized in a production environment than Caja. Caja could be seen as an interesting technique for the future but might not be ready to use today. The reason behind this conclusion was that Caja decreased the performance of the written JavaScript as well as adding complexity while developing the third-party applications.

    Fulltekst (pdf)
    A platform for third-party applications on the web.pdf
  • 79.
    Abrahamsson, Mats
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Ekonomiska institutionen, Logistik.
    Dagens Managementverktyg är alldeles för trubbigt.2004Inngår i: TH : Transport & Hantering, ISSN 0346-2773, Vol. 5, s. 20-21Artikkel i tidsskrift (Annet (populærvitenskap, debatt, mm))
  • 80.
    Abrahamsson, Mats
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Ekonomiska institutionen, Logistik.
    Det är skillnad på elitserien och lägre divisioner2004Inngår i: TH : Transport & Hantering, ISSN 0346-2773, Vol. 4Artikkel i tidsskrift (Annet (populærvitenskap, debatt, mm))
  • 81.
    Abrahamsson, Mats
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Ekonomiska institutionen, Logistik.
    Logistics in the Strategy of the Firm2007Inngår i: NOFOMA,2006, 2007, s. 15-20Konferansepaper (Fagfellevurdert)
  • 82.
    Abrahamsson, Mats
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Ekonomiska institutionen, Logistik.
    Nya tider kräver nya managementverktyg2003Inngår i: Management magazine, ISSN 1651-8055, Vol. 2Artikkel i tidsskrift (Annet vitenskapelig)
    Abstract [sv]

       

  • 83.
    Abrahamsson, Mats
    Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, Logistik. Linköpings universitet, Tekniska högskolan.
    The Role of Logistics in Corporate Strategy2010Inngår i: Dimensionen der Logistik / [ed] in Schönberger, R., & Elbert, R., Heidelberg: Gabler Research , 2010, s. 533-552Kapittel i bok, del av antologi (Annet vitenskapelig)
    Abstract [de]

    Funktionen, Institutionen und Handlungsebenen beschreiben die drei Dimensionen des von Professor Dr. Dr. h.c. Hans-Christian Pfohl geschaffenen Logistikwürfels. Anlässlich seiner Emeritierung beleuchten Wissenschaftler und Praktiker in 75 Fachbeiträgen die Logistik mit all ihren Facetten und aktuellen Entwicklungen und geben Anregungen für die zukünftige Forschung und Praxis.

  • 84.
    Abrahamsson, Mats
    Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, Logistik. Linköpings universitet, Tekniska högskolan.
    The Role of Logistics in Corporate Strategy2008Inngår i: Northern lights in logistics & supply chain management / [ed] Stentoft, Halldorsson, Jahre, Spens, Copenhagen: Copenhagen Business School Press, 2008, 1, s. 49-66Kapittel i bok, del av antologi (Fagfellevurdert)
    Abstract [en]

    "Northern Lights in Logistics & Supply Chain Management" portrays the past, present and future research of the subject in the Nordic countries. The NOFOMA conference - a network of Nordic researchers within the field of Logistics and Supply Chain Management - has been a focal point in the contribution to the continuous improvement and further development of Nordic research. The network has also opened up for interaction with fellow researchers from other countries. There are sixteen chapters in the book that in its own way colours the Nordic rainbow of research within Logistics and Supply Chain Management. The chapters are structured in four themes: 1) Origins and strategic aspects; 2) Research approaches in the Nordic countries; 3) Advancement of distribution strategies and; 4) Emerging application areas of logistics and SCM. The chapters provide an understanding and, perhaps more importantly, consciousness for scholars that are part of this research environment: Where are we now, what have we been influenced by, and in what area are we able to provide positive impact? The aim of the book is also to contribute to increased visibility to fellow international scholars within Logistics and Supply Chain Management.

  • 85.
    Abrahamsson, Mats
    et al.
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Ekonomiska institutionen, Logistik.
    Aldin, Niklas
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Ekonomiska institutionen, Logistik.
    Stahre, Fredrik
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Ekonomiska institutionen, Logistik.
    Logistics Platforms for Improved Dynamic Effectiveness2003Inngår i: The International Journal of Logistics Management, ISSN 0957-4093, Vol. 3Artikkel i tidsskrift (Fagfellevurdert)
  • 86.
    Abrahamsson, Mats
    et al.
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Ekonomiska institutionen, Logistik.
    Aronsson, Håkan
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Ekonomiska institutionen, Logistik.
    A model for measuring logistics structures2003Inngår i: ESTIEM magazine, ISSN 0874-5242, Vol. 25, nr 2/2003Artikkel i tidsskrift (Annet vitenskapelig)
    Abstract [en]

      

  • 87.
    Abrahamsson, Mats
    et al.
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Ekonomiska institutionen, Logistik.
    Aronsson, Håkan
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Ekonomiska institutionen, Logistik.
    Ett avancerat laboratorium för visualisering av logistiksystem2004Inngår i: TH : Transport & Hantering, ISSN 0346-2773, Vol. 3, s. 18-19Artikkel i tidsskrift (Annet (populærvitenskap, debatt, mm))
  • 88.
    Abrahamsson, Mats
    et al.
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Ekonomiska institutionen, Logistik.
    Aronsson, Håkan
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Ekonomiska institutionen, Logistik.
    Measuring Logistics Structure1999Inngår i: The International Journal of Logistics Management, ISSN 0957-4093, Vol. 2, nr 3, s. 263-284Artikkel i tidsskrift (Fagfellevurdert)
  • 89.
    Abrahamsson, Mats
    et al.
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Ekonomiska institutionen, Logistik.
    Aronsson, Håkan
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Ekonomiska institutionen, Logistik.
    Lindskog, Magnus
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Ekonomiska institutionen, Logistik.
    Beyond the Beer-Game: An Arena for Visualising Complex Logistics Systems.2004Inngår i: Annual NOFOMA Conference for Nordic Researchers in Logistics: Challenging Boundaries with Logistics.,2004, Linköping: Linköpings universitet , 2004Konferansepaper (Fagfellevurdert)
  • 90.
    Abrahamsson, Mats
    et al.
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Ekonomiska institutionen, Logistik.
    Brege, Staffan
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Ekonomiska institutionen, Industriell marknadsföring.
    Dynamic Effectiveness - Improved Industrial Distribution from Interaction between Marketing and Logistics Strategies2004Inngår i: Journal of Marketing Channels, ISSN 1046-669X, E-ISSN 1540-7039, Vol. 12, nr 2, s. 83-112Artikkel i tidsskrift (Fagfellevurdert)
  • 91.
    Abrahamsson, Mats
    et al.
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, Logistik.
    Brege, Staffan
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, Industriell marknadsföring och industriell ekonomi.
    Dynamic effectiveness: Improved industrial distribution from interaction between marketing and logistics strategies2005Inngår i: Journal of Marketing Channels, ISSN 1046-669X, E-ISSN 1540-7039, Vol. 12, nr 2, s. 83-112Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Based on different observations, in theory as well as in practice, we have identified strategies and operations following two different tracks, striving in different directions, despite it being well known they should go hand in hand. For companies challenged by a more and more dynamic business environment with heavier market segmentation, additional marketing channels, increasing globalisation on supplier and customer side, and high pressure on profit margins, the result from this is competitive weakness. The purpose of this article is to switch focus from operational effectiveness and strategic positioning as static success concepts on how to improve industrial distribution, to dynamic challenges of how to continuously manage the interaction between marketing strategies and operations (e.g., logistics) under the influence of a dynamic business environment. From theories in market strategies, logistics, flexibility, and marketing channels together with empirical experience from a best practice case study, we are introducing a model for dynamic effectiveness, describing the different characteristics of a company and what to focus on in order to become more dynamic. In order to constantly move to new market positions, and at the same time, restructure logistics and improve operational effectiveness, we have identified the dynamic capabilities of an organisation to be the key to success in industrial distribution. We define dynamic effectiveness as "how fast-and-well a company can go from one strategic positioning and productivity frontier to another." It tells that a frequent interaction between new strategic moves and actions for higher operational effectiveness is required to be in pace with the dynamic and changing business environment and to stay ahead of competition. As a part, of this, best, practice logistics performance makes it possible not only to be more agile to new strategic moves, but also to drive strategic development from a high operational level. This is achieved by designing logistics to be a resource base to support and be an enabler for new strategic moves on the market. © 2004 by The Haworth Press, Inc. All rights reserved.

  • 92.
    Abrahamsson, Mats
    et al.
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Ekonomiska institutionen, Logistik.
    Brege, Staffan
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Ekonomiska institutionen, Industriell marknadsföring.
    Norrman, Andreas
    Lunds universitet.
    Distribution Channel Reengineering - organizational separation of distribution and sales functions in the European market1998Inngår i: Transport Logistics, ISSN 0929-9645, E-ISSN 1568-5705, Vol. 1, nr 4, s. 237-249Artikkel i tidsskrift (Fagfellevurdert)
  • 93.
    Abrahamsson, Mats
    et al.
    Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, Logistik. Linköpings universitet, Tekniska högskolan.
    Karlöf, Stefan
    Sonat, Sverige.
    Det dynamiska företaget: om följsamhet och flödesorienterade affärsmodeller2011 (oppl. 1)Bok (Annet (populærvitenskap, debatt, mm))
    Abstract [sv]

    Dagens osäkra affärsklimat betraktas av många som ett problem och en risk som måste hanteras. I den här boken vänder författarna på perspektivet och betraktar osäkerheten som en möjlighet till framgång - om företaget har tillräcklig dynamisk förmåga. Den dynamiska förmågan innebär att företaget snabbt kan förändra sin marknadsstrategi och sin dagliga verksamhet. Det kräver en tydlig och flödesorienterad affärsmodell med en effektiv och följsam kedja från leverantör till slutkund. Denna bok presenterar en modell för hur företaget kan uppnå en sådan dynamisk effektivitet och diskuterar hur man kan omsätta den i praktisk handling. Boken vänder sig till chefer och ledningsgrupper i företag som vill utvecklas i takt med omvärldens krav och därmed få bäst förutsättningar att överleva och växa i det krävande affärsklimatet - survival of the fittest!

  • 94.
    Abrahamsson, Mats
    et al.
    Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, Logistik. Linköpings universitet, Tekniska högskolan.
    Malmgren, Mike
    Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, Logistik. Linköpings universitet, Tekniska högskolan.
    Andersson, Dan
    Chalmers.
    Inside the Core: Managing risks in Business Critical Outsourcing2011Inngår i: Proceedings of the 20th Annual IPSERA Conference, Vision 20/20 – Preparing Today for Tomorrow’s Challenges / [ed] F. Rozemeijer, M. Wetzels, L. Quintens, 2011, s. 1092-1101Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Organizations are increasingly outsourcing business critical activities, which increases the risk of substantial negative impact on the financial and strategic business performance. The aim of this paper is to show how outsourcer and supplier seek to mitigate the risks during the negotiations and the ongoing operations of the outsourced activities. The conclusion is that risk mitigating dimensions are directional and operates at different organizational levels, and secondly, that the dimension operates sequentially as a means to mitigate performance and relational risks. It is also concluded that goodwill trust and a cooperative stance have substantial impact on the success of the outsourcing.

  • 95.
    Abrahamsson, Mats
    et al.
    Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, Logistik. Linköpings universitet, Tekniska högskolan.
    Malmgren, Mike
    Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, Logistik. Linköpings universitet, Tekniska högskolan.
    Andersson, Dan
    Chalmers.
    Managing risk in complex and business critical outsourcing of services2011Inngår i: Proceedings of 18th International Annual Conference of the European Operations Management Association. EurOMA, 2011Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Over the past two decades the phenomenon of outsourcing of resources and activities has emerged as an important trend in a wide range of organizations and many companies are today outsourcing complex and business critical resources and activities. This increase in business criticality also increases the risk of substantial and negative impact on the financial and strategic performance. The proposition is that business critical outsourcing is approached with a joint risk perspective and that an understanding of the decision process is essential for success. Further, it is important to view outsourcing as an ongoing process with a number of key stages.

  • 96.
    Abrahamsson, Mats
    et al.
    Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, Logistik. Linköpings universitet, Tekniska högskolan.
    Rehme, Jakob
    Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, Industriell marknadsföring och industriell ekonomi. Linköpings universitet, Tekniska högskolan.
    The Role of Logistics in Retailers' Corporate Strategy: A Driver for Growth and Customer Value2010Inngår i: Supply Chain Forum: an International Journal, ISSN 1625-8312, E-ISSN 1624-6039, Vol. 11, nr 4, s. 14-23Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    This article explores the role of logistics and supply chain management (SCM) in retailers’ corporate strategy and is based on reviewing multiple qualitative case studies of companies in the Swedish food retail sector. The article proposes that the role of logistics for what is referred to in this paper as modern retailers is twofold: to create profitability and to support growth and market expansion. International modern retailers are empirically compared with similar companies in the Swedish market. The dominating Swedish food retailers have taken command in the food supply chain but are primarily concerned with traditional logistics roles in cost cutting. This role is perfectly fine as long as the strategic intent of the companies is focused on market retention and not on geographical expansion and/or new marketing or store concepts. We argue that the success of modern retailers in terms of growth rate, profitability, and market expansion is explained to a large extent by the role of logistics in corporate strategy—when the role for supporting growth and increasing customer value from high-performance supply capabilities is a driver for market expansion. However, in many of our cases the traditional logistics roles of cutting costs and lead-times is still the dominating pattern that limits the possibility of expanding into new markets. Better knowledge of logistics’ role in retail corporate strategy can help companies develop and improve their strategic intent as well as redefine the role of logistics.

  • 97.
    Abrahamsson, Mats
    et al.
    Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, Logistik. Linköpings universitet, Tekniska högskolan.
    Rehme, Jakob
    Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, Industriell marknadsföring och industriell ekonomi. Linköpings universitet, Tekniska högskolan.
    Sandberg, Erik
    Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, Logistik. Linköpings universitet, Tekniska högskolan.
    Olle, Olsson
    Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, Logistik. Linköpings universitet, Tekniska högskolan.
    The Role of Buying Groups in Retail Logistics2010Konferansepaper (Fagfellevurdert)
  • 98.
    Abrahamsson, Mats
    et al.
    Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, Logistik. Linköpings universitet, Tekniska högskolan.
    Rehme, Jakob
    Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, Industriell marknadsföring och industriell ekonomi. Linköpings universitet, Tekniska högskolan.
    Sandberg, Erik
    Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, Logistik. Linköpings universitet, Tekniska högskolan.
    Olsson, Olle
    Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, Logistik. Linköpings universitet, Tekniska högskolan.
    The role of purchasing groups in retail logistics2012Inngår i: Nordic retail research: emerging diversity / [ed] Johan Hagberg, Ulrika Holmberg, Malin Sundström, Lars Walter, Göteborg: Bokförlaget BAS , 2012, 1, s. 155-172Kapittel i bok, del av antologi (Annet vitenskapelig)
    Abstract [en]

    This book aims to provide an illustration of the diversity that characterises contemporary Nordic research in the field of retail. The book draws on a large variety of methods, describes a variety of retail sectors and covers a large number of retail phenomena. The book is suitable for researchers, graduate students and professionals who want to learn more about contemporary retailing research

  • 99.
    Abrahamsson, Mats
    et al.
    Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, Logistik. Linköpings universitet, Tekniska högskolan.
    Sandberg, Erik
    Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, Logistik. Linköpings universitet, Tekniska högskolan.
    Rehme, Jakob
    Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, Industriell marknadsföring och industriell ekonomi. Linköpings universitet, Tekniska högskolan.
    Logistik i svensk handel: ett projekt finansierat av Handelns Utvecklingsråd2011Rapport (Annet vitenskapelig)
    Abstract [sv]

    Den här rapporten sammanfattar ett forskningsprojekt, Logistik i svensk handel, som har pågått under perioden juli 2009 t.o.m. februari 2011 och som är finansierat av Handelns Utvecklingsråd.

    En utgångspunkt och hypotes för projektet var att det finns avgörande branschmässiga skillnader i sättet att arbeta med logistikfrågor. En hypotes som har testats mot empirin, vilket har lett till slutsatsen att logistiken endast i begränsad omfattning är branschspecifik och att branschtillhörighet inte är den avgörande faktorn för hur logistiken utformas för handelsföretag. En viktigare faktor, är hur butikerna drivs visavi centrala enheter, hur integrationen ser ut mellan logistikstrategi och inköps- respektive marknadsstrategi, samt hur systemgränserna för logistiken definieras.

    Genom hela arbetet har vi jämfört den logistikbild vi har sett med en ”ideal bild”, i form av logistiken i internationell ”mega-retailing”, vilket idag representerar ”best practice” inom logistik och där logistiken är en integrerad del av företagens affärsmodell och ett direkt stöd för företagets lönsamhet och tillväxt. Den jämförelsen visar att det är mycket stora skillnader i logistikkompetens och mognad mellan olika företag och att logistik inom många handelsföretag fortfarande är ett område med stor förbättringspotential.

    Förutom den här rapporten har projektet genererat en lång rad akademiska artiklar som är publicerade i journaler och/eller har presenterats på konferenser och seminarier. Vi har varit i kontakt med ett stort antal, kollegor, företag och forskare i Sverige och andra länder för att samla material. Ett stort tack till alla de som har bidragit med material till projektet.

    Ett speciellt tack till Andreas Hedlund på Handelns Utvecklingsråd, som förutom finansiellt stöd har backat upp projektet med seminarier arrangerade av Handelns utvecklingsråd.

    Linköping i Maj 2011

    Mats Abrahamsson   Jakob Rehme   Erik Sandberg

    Fulltekst (pdf)
    fulltext
  • 100.
    Abrahamsson, Mats
    et al.
    Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, Logistik. Linköpings universitet, Tekniska högskolan.
    Stahre, Fredrik
    Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, Logistik. Linköpings universitet, Tekniska högskolan.
    Huge-Brodin, Maria
    Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, Logistik. Linköpings universitet, Tekniska högskolan.
    Rehme, Jakob
    Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, Industriell marknadsföring och industriell ekonomi. Linköpings universitet, Tekniska högskolan.
    Andersson, Dan
    Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, Logistik. Linköpings universitet, Tekniska högskolan.
    Logistics Changes and Challenges in Swedish Food Supply Chains2008Inngår i: Nofoma 2008, 2008Konferansepaper (Fagfellevurdert)
1234567 51 - 100 of 29470
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf